Control: tags -1 + upstream
Control: retitle -1 multipath-tools: blacklist Xen devices by default

* Andreas Pflug <pgad...@pse-consulting.de> [180811 14:47]:
> Package: multipath-tools
> Version: 0.4.8+git0.761c66f-10
> Severity: normal
> 
> Since the multipath-tools package includes no standard multipath.conf, 
> multipathd will grab any new block device. This can lead to surprising and 
> hard debug effects.
> e.g. attaching a device in a XEN dom0 domain will render the device 
> inaccessible. This corrupts xen-utils-4.1 since xend will attach the boot 
> device locally for pygrub, but can't release it properly because multipathd 
> has it.
> 
> I suggest supplying at least a minimal multipath.conf that blacklists the 
> most dangerous devices by default.
> -- Package-specific info:
> Contents of /etc/multipath.conf:
> blacklist
> {
>       devnode "^xvd[0-9a-z]*"
> }

The built-in defaults in current versions appear to be:

blacklist {
    devnode "^(ram|raw|loop|fd|md|dm-|sr|scd|st|dcssblk)[0-9]"
    devnode "^(td|hd|vd)[a-z]"
    devnode "^cciss!c[0-9]d[0-9]*"
        ...
}

Note that this doesn't match xvd*, but is this still a thing with
current Xen versions, or has everything moved to vd* anyway?

Chris

Reply via email to